1.1: Risk Assessment (Doshi) Flashcards

1
Q

What are the elements of risk?

A

(1) Probability
(2) Impact
(3) Vulnerability
(4) Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the risk formula?

A

Risk = Probability X Impact

or

Risk = Asset Value X Vulnerability X Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a vulnerability?

A

Vulnerability is a weakness or gap in our protection efforts. Vulnerability can be in form of weak coding, missing anti-virus, weak access control and other related factors. Vulnerabilities can be controlled by us.

Vulnerability means weak or defenseless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat?

A

A threat is what we’re trying to protect against.Our enemy could be Earthquake, Fire, Hackers, Malware, System Failure, Criminals and many other unknown forces. Threats are not in our control.

Threat means something that can exploit the weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is there a threat for a useless system?

A

Even though vulnerability is high for a useless system, threats do not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Steps of Risk assessment are:

A

1- Understand the business environment
2- Identify critical Assets/Processes.
3- Identify relevant risks (Vulnerability and threat)
4 - Prioritize the risks in order of criticality/ Risk Prioritization
5- Evaluate various control mechanisms available
6 - Apple relevant controls/ Risk Treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IS Auditor identified certain threats and vulnerabilities in a business process. Next, an IS auditor should:

A. identify stakeholder for that business process.
B. identify information assets and the underlying systems.
C. disclose the threats and impacts to management.
D. identify and evaluate the existing controls.

A

C. disclose the threats and impacts to management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Avoid confusion between Threat and vulnerability

A

1- A threat is what we’re trying to protect against. Threats are not in our control.

2- Vulnerability is a weakness or gap in our protection efforts. Vulnerabilities can be controlled by us.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Absence of proper security measures represents a (n):

A. threat.
B. asset.
C. impact.
D. vulnerability.

A

D. vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Risk are:

A

(1) Inherent
(2) Residual
(3) Detection
(4) Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Inherent Risk

A

The risk that an activity would pose if no controls or other mitigating factors were in place (the gross risk or risk before controls).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Residual Risk

A

The risk that remains after controls are taken into account (the net risk or risk after controls).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Detection risk

A

Detection risk is the possibility that an auditor will overlook errors or exceptions during an audit. Detection risk should carried at the beginning of risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control risk

A

Risk that a misstatement could occur but may not be detected and corrected or prevented by entity’s internal control mechanism

Control risk is the probability that financial statements are materially misstated, due to failures in the system of controls used by a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Audit Risk

A

The risk that the financial statements are materially incorrect, even though the audit opinion states that the financial reports are free of any material misstatements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Audit Risk Formula

A

Audit Risk = Inherent Risk X Control Risk X Detection Risk

17
Q

Risk treatement

A
  • Risk Mitigation/Risk Reduction
  • Risk Avoidance
  • Risk Acceptance
  • Risk Transfer
18
Q

How to do a RISK Assessment

A
  • First step is to identify the assets. (in some cases critical process)
  • Second step is to identify relevant risk. (vulnerability/threat)
  • Third step is to do impact analysis. (qualitative or quantitative)
  • Fourth step is prioritizing the risk on the basis of impact.
  • Fifth step is to evaluate controls.
  • Sixth step is to apply appropriate controls.
19
Q

Control Risk:

A

Risk that a misstatement could occur but may not be detected and corrected or prevented by entity’s internal control mechanism